Abstract is missing.
- Under New Management: Practical Attacks on SNMPv3Nigel Lawrence, Patrick Traynor. [doi]
- Abusing Notification Services on Smartphones for Phishing and SpammingZhi Xu, Sencun Zhu. 1-11 [doi]
- Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol StacksRalf-Philipp Weinmann. 12-21 [doi]
- Security Analysis of Smartphone Point-of-Sale SystemsWesLee Frisby, Benjamin Moench, Benjamin Recht, Thomas Ristenpart. 22-33 [doi]
- WAFFle: Fingerprinting Filter Rules of Web Application FirewallsIsabell Schmitt, Sebastian Schinzel. 34-40 [doi]
- Off-Path Attacking the WebYossi Gilad, Amir Herzberg. 41-52 [doi]
- On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection SchemesSebastian Lekies, Mario Heiderich. 53-63 [doi]
- Microgadgets: Size Does Matter in Turing-Complete Return-Oriented ProgrammingAndrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, Michael Franz. 64-76 [doi]
- Frankenstein: Stitching Malware from Benign BinariesVishwath Mohan, Kevin W. Hamlen. 77-84 [doi]
- SMT Solvers in Software SecurityJulien Vanegue, Sean Heelan. 85-96 [doi]
- Web-based Attacks on Host-Proof Encrypted StorageKarthikeyan Bhargavan, Antoine Delignat-Lavaud. 97-104 [doi]
- Read It Twice! A Mass-Storage-Based TOCTTOU AttackCollin Mulliner, Benjamin Michéle. 105-112 [doi]